Search
Search Results
-
An empirical study on cross-component dependent changes: A case study on the components of OpenStack
Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...
-
When is it acceptable to break the rules? Knowledge representation of moral judgements based on empirical data
Constraining the actions of AI systems is one promising way to ensure that these systems behave in a way that is morally acceptable to humans. But...
-
Towards Cardinality-Aware Evidential Combination Rules in Dempster–Shafer Theory
The Dempster–Shafer theory has garnered significant attention for effectively managing uncertainty across various disciplines. However, the core...
-
Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone
This paper presents a direct construction of type-II Z-complementary pair (ZCP) of q -ary ( q is even) for all even lengths with a wide...
-
Sublinear Algorithms in T-Interval Dynamic Networks
We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...
-
Rethinking AI code generation: a one-shot correction approach based on user feedback
Code generation has become an integral feature of modern IDEs, gathering significant attention. Notable approaches like GitHub Copilot and TabNine...
-
Complex dynamic behaviour on fractional predator–prey model of mathematical ecology
In this paper, we present a mathematical predator–prey model in which the predator population is divided into two stages: mature (adult) stage and...
-
Software verification challenges in the blockchain ecosystem
Blockchain technology has created a new software development context, with its own peculiarities, mainly due to the guarantees that the technology...
-
Progress on half a century of process modelling research in steelmaking: a review
Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....
-
Distributed Optimization and Scaling Design for Solving Sylvester Equations
This paper develops distributed algorithms for solving Sylvester equations. The authors transform solving Sylvester equations into a distributed...
-
An exploratory evaluation of code smell agglomerations
Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...
-
An efficient algorithm for solving the variable-order time-fractional generalized Burgers’ equation
A numerical scheme based on the Haar wavelets coupled with the nonstandard finite difference scheme is presented to solve the variable-order...
-
Systematizing modeler experience (MX) in model-driven engineering success stories
Modeling is often associated with complex and heavy tooling, leading to a negative perception among practitioners. However, alternative paradigms,...
-
Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection
Recent advances in artificial intelligence (AI) are radically changing how systems and applications are designed and developed. In this context, new...
-
Secure electronic monitoring of sex offenders
Electronic monitoring is a viable approach to controlling sex offenders and making the environment safe for victims. Two technologies are currently...
-
An efficient approach of epilepsy seizure alert system using IoT and machine learning
Epilepsy is a neurological disorder that affects millions of people worldwide, and it is characterized by recurrent seizures that can vary in...
-
Existence and uniqueness of solutions for \(\Psi \)-Caputo fractional neutral sequential differential equations on time scales
In this paper, we establish the existence and uniqueness of solutions for a class of initial value problems involving implicit fractional...
-
On Penalized Goal-Reaching Probability Minimization with a Common Shock for an AAI
The authors consider a robust optimal reinsurance and investment problem in a risk model with two dependent classes of insurance business for an...
-
T-Type Digraphs via Kronecker Canonical Form
In this paper, the authors aim to study Kronecker canonical form theory for T-type digraphs, which can be used to construct trees by tensor product...
-
Reducing Hyperexponential Functions over Monomial Extensions
The authors extend the shell and kernel reductions for hyperexponential functions over the field of rational functions to a monomial extension. Both...